|
| 1 | +# AADSTS650056: Misconfigured application error |
| 2 | + |
| 3 | +# AADSTS650056: Misconfigured application error |
| 4 | + |
| 5 | +This article provides troubleshooting steps and solutions for the error message AADSTS650056: Misconfigured application. This error typically occurs when there are issues with permissions or consent configurations in an Azure Active Directory (Azure AD) application. |
| 6 | + |
| 7 | +## Symptoms |
| 8 | + |
| 9 | +When attempting to sign in to an application, you might encounter the following error message (or a similar message): |
| 10 | + |
| 11 | +AADSTS650056: Misconfigured application. This could be due to one of the following: |
| 12 | +- The client has not listed any permissions for 'AAD Graph' in the requested permissions in the client’s application registration. |
| 13 | +- The admin has not consented in the tenant. |
| 14 | +- Check the application identifier in the request to ensure it matches the configured client application identifier.Please contact your admin to fix the configuration or consent on behalf of the tenant. |
| 15 | + |
| 16 | +## Cause |
| 17 | + |
| 18 | +This error usually occurs due to one of the following reasons: |
| 19 | +- The application does not have the required permissions configured in its Azure AD registration. |
| 20 | +- The admin has not consented to the permissions for the application on behalf of the tenant. |
| 21 | +- The application identifier specified in the request does not match the registered application identifier in Azure AD. |
| 22 | + |
| 23 | +## Solution 1: Verify application permissions and consent (for application owners) |
| 24 | + |
| 25 | +If your organization owns the application (i.e., the application registration is in your organization's Azure tenant), follow these steps: |
| 26 | +1. Ensure that the application has at least the **User.Read** or **openid** delegated permission from **Microsoft Graph** added in its **API Permissions**. |
| 27 | +2. Check the **Status** column under **API Permissions** in the application's registration to verify whether the permissions are consented to. For example: |
| 28 | + - If the permission is not consented to, it will appear as pending. |
| 29 | + - If successfully consented, it will appear as "Granted for [Tenant Name]". |
| 30 | + |
| 31 | + Example of a consented permission: |
| 32 | + |
| 33 | + :::image type="content" source="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650052.png" alt-text="" lightbox="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650052.png"::: |
| 34 | +3. If the application is designed as a multi-tenant application, include the **User.Read** delegated permission in addition to other required permissions to simplify the consent process for customers. |
| 35 | +4. If the application appears in **App registrations** in Azure AD, ensure it is properly configured and consented to. Note: Do not confuse this with **Enterprise applications**. |
| 36 | + |
| 37 | +If the issue persists, you may need to generate a manual consent URL (refer to the "Manually build the consent URL" section below). |
| 38 | + |
| 39 | +## Solution 2: Admin consent for third-party applications |
| 40 | + |
| 41 | +If your organization is using the application as a third-party application (i.e., your organization is not the application owner), follow these steps: |
| 42 | +1. As the Global Administrator or Company Administrator, attempt to sign in to the application. You should see a consent screen prompting you to grant permissions. Ensure you check the box for **"Consent on behalf of your organization"** before proceeding. |
| 43 | + |
| 44 | + Example of the consent screen: |
| 45 | +:::image type="content" source="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650053.png" alt-text="" lightbox="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650053.png"::: |
| 46 | +2. If you do not see the consent screen, delete the application from the **Enterprise applications** section in Azure AD and try signing in again. |
| 47 | + |
| 48 | +If the error persists, proceed to the next solution. |
| 49 | + |
| 50 | +## Solution 3: Manually build the consent URL |
| 51 | + |
| 52 | +In some scenarios, you may need to manually generate a consent URL to grant permissions to the application. This is especially useful when the application is accessing specific resources that require custom configurations. |
| 53 | + |
| 54 | +### For the authorization V1 endpoint: |
| 55 | + |
| 56 | +The consent URL will look like this: |
| 57 | + |
| 58 | +https://login.microsoftonline.com/{Tenant-Id}/oauth2/authorize |
| 59 | +?response\_type=code |
| 60 | +&client\_id={App-Id} |
| 61 | +&resource={App-Uri-Id} |
| 62 | +&scope=openid |
| 63 | +&prompt=consent |
| 64 | + |
| 65 | +For example: |
| 66 | + |
| 67 | +https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/authorize |
| 68 | +?response\_type=code |
| 69 | +&client\_id=044abcc4-914c-4444-9c3f-48cc3140b6b4 |
| 70 | +&resource=https://vault.azure.net/ |
| 71 | +&scope=openid |
| 72 | +&prompt=consent |
| 73 | + |
| 74 | +### For the authorization V2 endpoint: |
| 75 | + |
| 76 | +The consent URL will look like this: |
| 77 | + |
| 78 | +https://login.microsoftonline.com/{Tenant-Id}/oauth2/v2.0/authorize |
| 79 | +?response\_type=code |
| 80 | +&client\_id={App-Id} |
| 81 | +&scope=openid+{App-Uri-Id}/{Scope-Name} |
| 82 | +&prompt=consent |
| 83 | + |
| 84 | +For example: |
| 85 | + |
| 86 | +https://login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/v2.0/authorize |
| 87 | +?response\_type=code |
| 88 | +&client\_id=044abcc4-914c-4444-9c3f-48cc3140b6b4 |
| 89 | +&scope=openid+https://vault.azure.net/user\_impersonation |
| 90 | +&prompt=consent |
| 91 | + |
| 92 | +### Notes: |
| 93 | +- If the application is accessing itself as the resource, the **{App-Id}** and **{App-Uri-Id}** will be the same. |
| 94 | +- Obtain the **{App-Id}** and **{App-Uri-Id}** from the application owner. |
| 95 | +- The **{Tenant-Id}** corresponds to your tenant identifier, which can be either your domain (e.g., yourdomain.onmicrosoft.com) or your directory ID. |
| 96 | + |
| 97 | +Example of a tenant identifier: |
| 98 | +:::image type="content" source="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650054.png" alt-text="" lightbox="https://blogs.aaddevsup.xyz/wp-content/uploads/2019/11/112719_1815_AADSTS650054.png"::: |
| 99 | + |
| 100 | +By following these steps, you can resolve the AADSTS650056: Misconfigured application error. If the issue persists, contact your application owner or Azure AD administrator for further assistance. |
0 commit comments